Tuesday, November 26, 2019

Free Essays on Battle Of Gettysburg

THE BATTLE OF GETTYSBURG The Battle of Gettysburg was a crucial battle that changed the outcome of the Civil War due to the decisions made by the generals of both the Union Army and the Confederate Army. The Gettysburg Address given by President Lincoln continues to remind us of the outstanding military achievements and devastating human sacrifice our country suffered due to this battle and the Civil War. Gettysburg did not turn out to be just another clichà © of battles and wars; just because you have won a battle doesn’t mean that you have won the war. Gettysburg turned out to be the largest and most important battle that signified a beginning of the end of the Confederate States of America. Orchestrated by generals and won by the brave men who spilled their blood in order to defend an idea conceived under a new nations declaration of equality and freedom (Axelrod 197). The events that led up to the bloodiest battle of the Civil War transpired in the month previous when after the death of Confederate General â€Å"Stonewall† Jackson, General Robert E. Lee Commander of the Army of Northern Virginian reorganized his army into three Army Corps under Generals Longstreet, Ewell, and A.P. Hill with a Calvary division under J.E.B. Stuarts total strength was about 75,000. The Northern Federalist consisted of about 95,000 strong under General Joseph â€Å"Fighting Joe† Hooker who commanded the Federal Army of the Potomac. General Hooker’s defect as a commanding officer became apparent when Confederate General Lee with fewer than half the men, outmaneuvered him and caused a Union retreat. On June 13th Confederate General Ewell’s corps appeared at Winchester and proceeded on the 14th and 15th to attacked the 9,000 strong Union garrison at Winchester and defeated it taking valuable war materials and inflicting heavy losses for the Union. On 25th June General Lee agreed to General Stuart’s plan to take three brigades of Calvary acro... Free Essays on Battle Of Gettysburg Free Essays on Battle Of Gettysburg THE BATTLE OF GETTYSBURG The Battle of Gettysburg was a crucial battle that changed the outcome of the Civil War due to the decisions made by the generals of both the Union Army and the Confederate Army. The Gettysburg Address given by President Lincoln continues to remind us of the outstanding military achievements and devastating human sacrifice our country suffered due to this battle and the Civil War. Gettysburg did not turn out to be just another clichà © of battles and wars; just because you have won a battle doesn’t mean that you have won the war. Gettysburg turned out to be the largest and most important battle that signified a beginning of the end of the Confederate States of America. Orchestrated by generals and won by the brave men who spilled their blood in order to defend an idea conceived under a new nations declaration of equality and freedom (Axelrod 197). The events that led up to the bloodiest battle of the Civil War transpired in the month previous when after the death of Confederate General â€Å"Stonewall† Jackson, General Robert E. Lee Commander of the Army of Northern Virginian reorganized his army into three Army Corps under Generals Longstreet, Ewell, and A.P. Hill with a Calvary division under J.E.B. Stuarts total strength was about 75,000. The Northern Federalist consisted of about 95,000 strong under General Joseph â€Å"Fighting Joe† Hooker who commanded the Federal Army of the Potomac. General Hooker’s defect as a commanding officer became apparent when Confederate General Lee with fewer than half the men, outmaneuvered him and caused a Union retreat. On June 13th Confederate General Ewell’s corps appeared at Winchester and proceeded on the 14th and 15th to attacked the 9,000 strong Union garrison at Winchester and defeated it taking valuable war materials and inflicting heavy losses for the Union. On 25th June General Lee agreed to General Stuart’s plan to take three brigades of Calvary acro...

Saturday, November 23, 2019

Battle of Lutzen in the Thirty Years War

Battle of Lutzen in the Thirty Years' War Battle of Lutzen - Conflict: The Battle of Lutzen was fought during the Thirty Years War (1618-1648). Armies Commanders: Protestants Gustavus AdolphusBernhard of Saxe-WeimarDodo Knyphausen12,800 infantry, 6,200 cavalry, 60 guns Catholics Albrecht von WallensteinGottfried zu PappenheimHeinrich Holck13,000 infantry, 9,000 cavalry, 24 guns Battle of Lutzen - Date: The armies clashed at Lutzen on November 16, 1632. Battle of Lutzen - Background: With the early onset of winter weather in November 1632, Catholic commander Albrecht von Wallenstein elected to move towards Leipzeig believing that the campaign season had concluded and that further operations would not be possible. Splitting his army, he sent the corps of General Gottfried zu Pappenheim on ahead while he marched with the main army. Not to be discouraged by the weather, King Gustavus Adolphus of Sweden decided to strike a decisive blow with his Protestant army near a stream known as the Rippach where he believed von Wallensteins force was encamped. Battle of Lutzen - Moving to Battle: Departing camp early on the morning of November 15, Gustavus Adolphus army approached the Rippach and encountered a small force left behind by von Wallenstein. Though this detachment was easily overpowered, it delayed the Protestant army by a few hours. Alerted to the enemys approach, von Wallenstein issued recall orders to Pappenheim and assumed a defensive position along the Lutzen-Leipzig road. Anchoring his right flank on a hill with the bulk of his artillery, his men quickly entrenched. Due to the delay, Gustavus Adolphus army was behind schedule and encamped a few miles away. Battle of Lutzen - Fighting Begins: On the morning of November 16, the Protestant troops advanced to a position east of Lutzen and formed for battle. Due to heavy morning fog, their deployment was not completed until around 11:00 AM. Assessing the Catholic position, Gustavus Adolphus ordered his cavalry to assault von Wallensteins open left flank, while the Swedish infantry attacked the enemys center and right. Surging forward, the Protestant cavalry quickly gained the upper hand, with Colonel Torsten Stalhandskes Finnish Hakkapeliitta cavalry playing a decisive role. Battle of Lutzen - A Costly Victory: As the Protestant cavalry was about to turn the Catholic flank, Pappenheim arrived on the field and charged into the fight with 2,000-3,000 horsemen ending the imminent threat. Riding forward, Pappenheim was struck by a small cannonball and mortally wounded. Fighting continued in this area as both commanders fed reserves into the fight. Around 1:00 PM, Gustavus Adolphus led a charge into the fray. Becoming separated in the smoke of battle, he was struck down and killed. His fate remained unknown until his rider-less horse was seen running between the lines. This sight halted the Swedish advance and led to a rapid search of the field which located the kings body. Placed in an artillery cart, it was secretly taken from the field lest the army become disheartened by their leaders death. In the center, the Swedish infantry assaulted von Wallensteins entrenched position with disastrous results. Repulsed on all fronts, their broken formations began streaming back with the situation made worse by rumors of the kings death. Reaching their original position, they were calmed by the actions of the royal preacher, Jakob Fabricius, and the presence of Generalmajor Dodo Knyphausens reserves. As the men rallied, Bernhard of Saxe-Weimar, Gustavus Adolphus second-in-command, took over leadership of the army. Though Bernhard initially wished to keep the kings death a secret, news of his fate quickly spread through the ranks. Rather than causing to the army to collapse as Bernhard feared, the kings death galvanized the men and yells of They have killed the King! Avenge the King! swept through the ranks. With their lines re-formed, the Swedish infantry swept forward and again assaulted von Wallensteins trenches. In a bitter fight, they succeeded in capturing the hill and the Catholic artillery. With his situation rapidly deteriorating, von Wallenstein began retreating. Around 6:00 PM, Pappenheims infantry (3,000-4,000 men) arrived on the field. Ignoring their requests to attack, von Wallenstein used this force to screen his retreat towards Leipzig. Battle of Lutzen - Aftermath: The fighting at Lutzen cost the Protestants around 5,000 killed and wounded, while Catholic losses were approximately 6,000. While the battle was a victory for the Protestants and ended the Catholic threat to Saxony, it cost them their most able and unifying commander in Gustavus Adolphus. With the kings death, the Protestant war effort in Germany began to lose focus and the fighting continued another sixteen years until the Peace of Westphalia. Selected Sources History of War: Battle of LutzenGustavus Adolphus Sweden

Thursday, November 21, 2019

Human Behavior Essay Example | Topics and Well Written Essays - 750 words - 1

Human Behavior - Essay Example On this account, diversity management spells that incorporating a diverse workforce in an organization is indispensable to tapping into international markets, adapting to the varying business environments, and taking advantage of the rising opportunities. Diversity management thus embodies appreciation of differences in human behaviour and fully capitalizing on them to ensure optimal organizational performance. This paper reviews the role played by cultural diversity and ethical differences in organizational functionality and overall the performance. Seymen O. A. (2006) reviews the concept of cultural diversity and the different approaches to managing the diversity in an organizational set-up. Cultural diversity here is defined as a mixture of different people having distinct identities in matters pertaining to behaviour, traditions, and attitudes towards some issues. Cultures tend to differ as one moves from one geographic location to the other. Therefore, since business operations are no longer limited by geographic boundaries, it is almost impossible for an organization to operate successfully operate on a global scale without a culturally diverse workforce. Workers belonging to a given culture have a very distinct way in which they express their ideas and perceive the various issues in the corporate world. For instance, some cultures have negative perception about the idea of women dressing in tight trousers. On the other hand, there are those cultures which permit the freedom of dress code. Therefore, an organization having members drawn from such a diverse workforce must acknowledge this variations and effectively learn to manage the diversity. The other aspect of human behaviour which exhibits considerable diversity is in so far as matters of personal ethics are concerned. Just as is the case with culture, ethical standards which a person subscribes too is

Tuesday, November 19, 2019

No need for topic Essay Example | Topics and Well Written Essays - 250 words - 7

No need for topic - Essay Example The various components of this chapter are highly related with the course content in the sense that Presidential powers might impose significant impact on the entire political system of the nation. In this regard, American constitution provides Presidents with the powers to frame proposals and develop effective strategies (Ginsberg, Lowi, Weir and Tolbert 492-534). Ginsberg, Lowi, Weir and Tolbert (492-534) stated that Presidents have the responsibility to safeguard every state against any kind of assault as well as national violence. Thus, it is quite vital to understand the powers of Presidents that have extensive influences on various federal aspects of the US (Ginsberg, Lowi, Weir and Tolbert 492-534). Ginsberg, Lowi, Weir and Tolbert (492-534) further stated that although Presidents are somehow unable to introduce any strict legislation and do not possess leading role in making law, they play imperative role in other spheres that include budget creation and dealing with key national problems. However, a President can expand his/her power through performing effective management practices. Going public is also regarded as one of the chief sources of Presidential power. Particularly, in the political system of America, the varied constitutional powers of Presidents have huge role to play in directing the nation towards right path (Ginsberg, Lowi, Weir and Tolbert

Sunday, November 17, 2019

Phonology reading Essay Example for Free

Phonology reading Essay 1. I hereby certify that I am the author of the attached item of coursework and that all materials from reference sources have been properly acknowledged. 2. I understand what plagiarism is and what penalties may be imposed on students found guilty of plagiarism. 3. I certify that this paper contains no plagiarized material. 4. I certify that this is my own work and that I did not receive any unfair assistance from others (including unauthorized collaboration) in its preparation. 5. I certify that this paper has not previously been submitted either in its entirety or in part within the UWI system or to any other educational institution. 6. In the case of group work: a. I certify that the individual work of each member of the group has been clearly indicated; b. that where no such indication has been given, I take the responsibility for the work as if it were the section of the paper for which I am solely responsible; and c. that I have not collaborated with any members of the group to breach the University’s regulations. Signature: M. Thompson Date: February 25, 2013 Children of the 21st century will face many challenges that will require them to use reading in different forms. As we begin the new millennium, research- based approaches to teach reading and writing is being relied upon to drive students towards the ultimate goal. Literacy for all, understanding how children learn, particularly how they learn to read and write influences the instructional approaches taken in homes as well as classrooms. Adams (1990) defines Phonological awareness as an awareness of sounds and the ability to revealed tasks such as rhyming, matching sounds, deleting sounds, blending or segmenting sounds. Because these sounds are spoken words they require testing to manipulate phonological segments. This is required to determine the performance of good readers and poor readers. Depend on the result one can determine which elements of phonological awareness are absent or reliable for both readers. He further articulate that they are five levels of difficulty in phonological awareness these are Awareness of rhyme and alliteration, comparing and contrasting the sounds of words for rhyme and alliteration, blending and splitting syllables, full segmentation of component phonemes and adding deleting and moving phonemes. In addition to these five levels of difficulty is the importance of phonological development. Phonological development is the key to phonological awareness. Proctor and Compton (2004) babies are not born with the full range of adult perceptual abilities, which include the five senses vision, hearing, smell, taste and touch. However, these abilities develop greatly within the first year of life. Newborn babies can only process sensory information and their understanding of sight, sound and touch stimuli develop rapidly as they grow. This leads to cognitive development which, in turn lays the foundation for language development. In preschool years, a child develops phonological skills, these skills acquired in a largely unconscious, or implicit fashion that is to say, even though the child may be able to produce certain vowels, consonants and consonant clusters he or she has not explicit awareness of doing so. Phonological awareness is so called because the child becomes explicitly aware of the phonology being taught and has the conscious ability to detect and manipulate phonological units. It is important to note that phonological awareness is a subset of the larger set of skills known as phonological processing. Phonological processing involves receiving sound waves from the ear and then using this date to assemble pronunciation of the word that was spoken. The process of assembling a pronunciation is known as coding. Deficits in phonological processing are responsible for some differences between good and poor readers (Stanorich, 1986 😉 poor readers are slower and less accurate than good readers. Many studies have found that certain levels of phonological awareness are essential to the development of early reading ability such as an awareness of rhyme, the ability to blend sounds, to isolate initial and final consonants and to distinguish phonological elements smaller than Syllables. Other more difficult elements of phonological awareness are developed as a result of learning to read, that is â€Å"the relationship between phonemic awareness and learning to read is most likely one of reciprocal causation or mutual facilitation (Yopp, 1992,) The relationship between phonological awareness and reading acquisition are complex, and there is strong evidence that difficulty with awareness and manipulation of verbal sounds has powerful effects on reading ability. However, the most positive finding stemming from research on phonological awareness is that â€Å"critical levels of phonological awareness can be developed through carefully planned instruction† (Chard Dickson 1999) there is also consistent support that â€Å"phonological awareness facilitates reading and is facilitated by reading instruction. † (Smith,Simmons Kameenui 1995) This finding has important implications for teaching. It implies that students must be taught explicitly about sounds in order to benefit from reading instruction but also that phonological awareness can be highlighten in relation to reading of text. Teaching programs, therefore, need to include activities which focus on the sounds in spoken English in pre-school and in the early years of schooling. Such activities include rhyming activities, breaking speech into individual words, alliteration, blending sounds, segmenting of words into onset rime and then to more demanding tasks such segmenting or deletion of individual. Charles A. Perfetti, Nicole Landi, and Jane Oakhill simple state that reading acquisition is the comprehension of learning to understand writing as well as one understands spoken language has empirical justification. (Curtis, 1980; Sticht James, 1984). also added that learning to read, the correlations between reading and spoken language comprehension are small because at the beginning, children are learning to decode and identify words, so it is these word-reading processes that limit comprehension. He further established that as children move beyond the beginnings of learning to read, the correlations between reading comprehension and spoken language comprehension increase and then level out by high school Famous behaviorist skinner (1974) explained students learn to read by learning a series of discrete skills. He believes that learning is the result of stimulus and response actions direct instructions are given when teaching the requisite skill in a planned, sequential manner. Information is presented in small steps and reinforced through practice until a solid foundation is laid. Jean Piagets (1969) constructivism theoretical framework differs, as learning is described as the modification of students’ cognitive structures schemata as they interact with or adapt to their environment schemata are like mental filing cabinets and new information is organized with prior knowledge in filling system. Piaget also posited that children are active motivated thinkers and learners so instead of teachers and adults dispensing information or knowledge, children are engaged with experiences so that they modify their schemata and construct their own knowledge. The sociolinguistics contributes a cultural dimension to how children learn. They view reading and writing as social activities that reflect the culture and community in which children live. (heath ,1983 ,vygotsky1978,1986)according to Vygotsky, language help to organize thought and children use language to learn as well as to communicate with others. Tremendous amount of new research under the term â€Å"emergent literacy† (teale sulzby 1991) shows us what happens in the homes of children where literacy is a priority. Children borned into homes where someone spends time with them in reading activities walk into the school system with an incredible foundation on which phonological awareness can be built. Parents or adults read to children and talk to them about what is being read. The reading is normally done in the lap position where the child can see pictures as well as the words used to tell about the pictures. Favourite books are read again and again hence creating a stimulating environment for reading acquisition to begin. Parents are the children’s first and best teachers and can therefore do many things to support their children’s development at home. In addition to reading to their children and listening to their children attempting to read to them they are building children’s self esteem and phonological awareness. In some homes the main reading experience is the bible, new papers, nursery rhyme or novels. Families write signs on furniture, make shopping lists or leave written messages for others. As children are able to hear and identify sounds from intra uterine to infancy, gradually they are able to separate syllables and manipulate the sounds in words, expanding their grasp of frequently used words and phrases. Favourite stories are re-read until they become well-known and words are easily pronounced as they talk an appreciation is developed for associating sounds with letters, a basis that is necessary for learning to read. The phonological system is important for both oral and written language as it plays a crucial role in reading instruction during the primary grades. Children use their knowledge of phonics as they learn to read and write. Phonological Development and Phonological Awareness Unit 2, outline that phonological awareness cannot be the only cause of reading acquisition. This is so based on the studies carried out which discover other influence on reading development. Adams 1990 highlighted the importance of alphabetic principle which consists of alphabetic understanding with the knowledge that letters correspond with sounds and words are composed of sounds. Therefore, it is evident that phonological awareness and reading acquisition has some forms of relationship; since both has powerful effects on reading ability. Based on the information gathered the levels of phonological awareness can be developed through carefully planned instruction where students must be taught clearly about sounds in order to benefit from reading instruction and develop phonological ability. The importance of phonological awareness in relation to reading acquisition posits by Juel, 1986) a longitudinal study of children in first and second grade. The study is quiet evident that children who perform low in phonemic awareness in first grade remained the low performances in reading through fourth grade remain the low performers in reading through fourth grade. With this in mind when working with children it must be clear that phonemic awareness is a perquisite for learning to read Cunningham, 1999, as they become phonemically aware, children recognize that speech can be segmented into smaller units, this knowledge is very useful as they learn about sound-symbol correspondence and spelling patterns. Phonological development  and phonological awareness unit 2 posits that phonemic awareness is critical to the reading process because reading involves the translation of graphemes into phonemes if one does not mastered all the phonemes in language, then they are not in a position to translate graphemes into phonemes, students’ who have not mastered phonemic awareness experience reading difficulty. So with this is mind one relevant key principle of effective phonological awareness instruction is nursery rhymes. Rhymes are the correspondence of ending sounds or words or lines of verse. Rhyming is the ability to indentify words that have identical final sounds segments Bryan and Bradley (1985)report that scores of initial rhyming test predicted reading and spelling progress and years later researcher suggest rhyme facilitates reading and spelling in the following ways: rhyming helps students develop phonemic awareness, which facilitates decoding, rhyming teaches students to group words together by sound, thereby reducing the number of words they have to learn to read by making generalizations of larger sound units, rhyming teaches students to make connections between categories and the letter string patterns that are used to spell words. I would read stories that have rhyming words, draw to the students attention the word that rhyme, help students to identify the patterns made by a rhyme, recite rhymes, sing the rhymes, clap to the rhymes even act out the rhymes. Sing and use students’ names to complete the rhyme example wallaby Wallaby, Wusan an elephant sat on Suzan wallaby Wallaby Wark an elephant sat on Mark as students catch on to the rhyming pattern, they can generate the rhyme using other names. For example in these four activities the teacher read aloud a story that contains many words that rhyme for example a fat rat in hat. After reading the story the students will chant the rhyming words heard in the story. The next activity the teacher introduce the rhyme ‘at’ then students follow the rhyming pattern bat, cat, fat, hat, mat pat, rat and sat. Students will clap and sing as they say each rhyming word. For activity two students will stand in a line the first person will say a rhyme which relates to ‘at’ if it is correct, the child gets the chance to shoot a ball in the provided hoop. If it is incorrect, teacher and students will assist and that child goes to the back of the line. The last activity students will be provided with a print activity sheet in which they will fill in the missing letter based on what was learned in activities one and two above. These activities will be modeled daily until students fully grasped the concepts. Modeling is the process of demonstrating for someone something he or she does not know Bandura,(1986). when students see teachers or parents at home reading or writing a letter modeling is taking place, so that’s why modeling can be a very constructive way that students can be taught reading. Modeling can be implicit or explicit (Roehler duffy , 1991). According to Deanna mascle rhyme is important to emergent literacy and learning to read because it teaches children about language. Rhyming helps children about word families such as let, met, pet, and get. Rhyming also teaches children the sound of language. Other important skills include phonological awareness, the ability to notice and work with sounds in language. Rhyme help with phonemic awareness which is the smallest units of sound that make up words. The awareness leads to reading and writing success. Rhyme also teaches children who are learning to read about the patterns and structures of both spoken and written language. Rhymes expose children to the rhythm of the language this will help them read with intonation in their voice instead of first a monotone. Rhymes also prepare children to make predictions while learning words and give them crucial decoding skills. When students are faced with reading challenges as that one referred to in the study by Juel et al( 1986) that children from first grade through fourth are low performing children in phonemic awareness rhyme, can help make the task both easier and more fun, teach important language skills, and teach language pattern and structure. These benefits given above are of vital importance in giving your child a positive start to reading. References. http://www. pitt. edu/~perfetti/PDF/The%20Acquisition%20of%20Reading%20Comprehension%20Skill http://linguistics. huji. ac. il/IATL/27/Abstracts/Gafni. pdf http://Ezine article. com/? expert=Deanna_mascle. Literacy for the 21st century A Balanced Approach 4th edition by Gail E. Tompkins Literacy helping children construct meaning 5th edition by J. David Cooper with Nancy D. Kiger Phonics They Use words for reading and writing by Patricia m. Cunningham Unit 2 EDLS6501 Module 2 Phonological Developments and Phonological Awareness.

Thursday, November 14, 2019

The Evolution of Democracy in Georgia Essay -- European Europe History

The Georgian people made its choice on 26 May 1918, when it voted for democracy and pluralism in the conditions of a free Georgia. 26 May was destroyed by Bolshevik bayonets, but the idea of freedom and democracy remain undefeated in the Georgian - Statement of the National Democratic Party, 1988.1 In the late 1980s and early 1990s, the Caucasian country of Georgia (map below) was among the vanguard of forces seeking the dissolution of the Soviet Union. It was the only republic to join the Baltic in flatly refusing to even consider signing Gorbachev's new Union treaty in 1990.2 Agitation for Georgian independence led to a series of bloody clashes with the authorities that only served to further radicalize the nationalists. When discussing the prospects for independence, many Georgians mentioned the short-lived Georgian Democratic Republic, which managed to survive for "three halcyon years... 1918-1921, the period lovingly referred to by Georgians as 'independent Georgia'."3 This brief period was critically important for the development of a Georgian nationalism. In effect, the existence of Georgia as an independent nation led to the birth and initial growth of nationalism in Georgia. The history of Georgia from 1917 to 1921 shows a steadily increasing national feeling, which wa s not crushed by the Soviet invasion and later formed the basis of the strong separatist tendencies of the Georgians in the final decades of the Soviet Union. Before the Russian Revolution, Georgian national feeling was so subdued as to be effectively negligible. The absorption of feudal Georgia into the Russian Empire in 1801 and the subsequent Russian administration of the country were widely accepted as necessary for the protection of the country a... ... 192. 27. Kazemzadeh, The Struggle, 118. 28. Zourab Avalishvili, The Independence of Georgia in International Politics, 1918-1921 (Westport, Connecticut: Hyperion Press, Inc., 1990), 64 - 65. 29. Kazemzadeh, The Struggle, 126. 30. Ibid., 148. There was also talk in Berlin of installing some German prince as King of Georgia, but this was abandoned once the strength of the Socialists in Georgia was understood. 31. Suny, Georgian Nation, 195. 32. Ibid., 201. 33. Nasmyth, Georgia, 301. 34. Kazemzadeh, The Struggle, 196. 35. Suny, Georgian Nation, 199. 36. Kazemzadeh, The Struggle, 182 - 183. 37. Nasmyth, Georgia, 52. 38. Kazemzadeh, The Struggle, 197 39. Ibid., 197. 40. Ibid., 199. 41. Suny, Georgian Nation, 207. 42. Kazemzadeh, The Struggle, 203. 43. Ibid., 328. 44. V. I. Lenin, quoted in Kazemzadeh, The Struggle, 324. 45. Suny, Georgian Nation, 208.

Tuesday, November 12, 2019

Dance Captain

The Dance Captain is a member of the company who maintains the artistic standards of all Choreography and/or musical staging in a production. The Dance Captain shall always work in tandem with the Stage Manager in conveying and maintaining the creative intentions of the production. The Dance Captain is a member of the company who maintains the artistic standards of all choreography and/or musical staging in a production. The Dance Captain shall always work in tandem with the Stage Manager in conveying and maintaining the creative intentions of the Artistic Staff. The Advisory Committee on Chorus Affairs (ACCA), in conjunction with the Dance Captain Subcommittee, is issuing these suggested guidelines to assist the Dance Captains in their assigned position. 1. Maintaining Artistic Standards and Technique of Original Production a. Review musical staging and choreography, give notes and/or schedule brush-up rehearsals (in coordination with the Stage Manager). Maintain all musical staging and choreography in the original style, intent, technique and energy level. (Note: All rehearsals are called by the Stage Manager as per allotted hours set forth in the contract). . Maintain original spacing and positions in musical numbers. c. Make sure condition of stage, rehearsal and/or audition space is safe and suitable for musical staging and/or choreography for rehearsals and performances. d. Within a reasonable period of time after show is set, the Dance Captain shall learn all choreography and musical staging. e. In cases of complaints or differences of opinion between cast members concerning choreography and/or musical staging, the Dance Captain shall make the decision. f. The Dance Captain may not be required to block non-musical scenes. . Responsibilities to Understudies and Swings a. assist the Stage Manager and choreographer, or their assistants, in the assignment of understudies and swings for numbers and important bits of business in musical staging and/or choreography. b. See that understudies and swings are prepared to perform assignments in musical numbers. 3. Responsibilities for Replacements a. Audition replacement Actors in regards to musical staging and/or choreography when required. b. Teach chorus or principal replacements choreography and staging of musical numbers. . Rehearse replacement with cast members involved in musical numbers prior to their first performance. d. Apprise Actors of possible technical problems they may encounter, such as quick change set-ups, involvement with set 1changes or use of props in c oordination and cooperation with Stage Manager. Work environment. Dance is exhausting. In fact, dancers have one of the highest rates of nonfatal on-the-job injury. Many dancers, as a result, stop performing by their late thirties because of the physical demands on the body. Nevertheless, some continue to work in the field as choreographers, artistic directors, and dance teachers and coaches, while a small number may move into administrative positions, such as company managers. A few celebrated dancers, however, continue performing most of their lives. Many dance companies’ tour for part of the year to supplement a limited performance schedule at home. Dancers who perform in musical productions and other family entertainment spend much of their time on the road; others work in nightclubs or on cruise ships. Most dance performances are in the evening, whereas rehearsals and practice usually take place during the day. As a result, dancers often work very long and late hours. Generally, dancers and choreographers work in modern and temperature-controlled facilities; however, some studios may be older and less comfortable. Dancers generally need long-term on-the-job training to be successful. Most dancers begin formal training at an early age—between 5 and 15—and many have their first professional audition by age 17 or 18. Some earn a bachelor's degree or attend dance school, although neither is required. Becoming a choreographer usually requires years of experience. Education and training; Training varies with the type of dance and is a continuous part of all dancers' careers. Many believe that dancers should start with a good foundation in classical technique before selecting a particular style. Ballet training for girls usually begins between the ages of 5 to 8 with a private teacher or through an independent ballet school, with more serious training beginning between the ages of 10 and 12. Boys often begin their ballet training between the ages of 10 and 15. Students who demonstrate potential in their early teens may seek out more intensive and advanced professional training. At about this time, students should begin to focus their training on a particular style and decide whether to pursue additional training through a dance company's school or a college dance program. Leading dance school companies often have summer training programs from which they select candidates for admission to their regular full-time training programs. Formal training for modern and culturally specific dances often begins later than training in ballet; however, many folk dance forms are taught to very young children. As a result, a good number of dancers have their first professional auditions by age 17 or 18. A college education is not essential for employment as a professional dancer; however, many dancers obtain degrees in unrelated fields to prepare themselves for careers after dance. The completion of a college program in dance and education is usually essential to qualify to teach dance in college, high school, or elementary school. Colleges and conservatories sometimes require graduate degrees but may accept performance experience. A college background is not necessary for teaching dance or choreography in local recreational programs. Studio schools prefer teachers to have experience as performers. Dancers generally need long-term on-the-job training to be successful. Most dancers begin formal training at an early age—between 5 and 15—and many have their first professional audition by age 17 or 18. Some earn a bachelor's degree or attend dance school, although neither is required. Becoming a choreographer usually requires years of experience. There are many advantages to being a dancer a dancer's life is no 9 to 5 job. Some days you may work just three or four hours, and others you will be dancing until the late hours. Your schedule will depend on the type of job you have booked. In between set gigs, you will also be working by attending auditions, as well as participating in workshops to continue learning new dances techniques. Staying In Shape In order to be a successful dancer, your body must be in superb shape. Alternate between different dance styles and stretching routines to tone muscles in all areas of the body. This will keep your body flexible to avoid pulling or spraining joints and muscles. Changing up your routine will also keep it from becoming monotonous, and open you up to new choreographic styles, as well. Being able to work out as a part of your profession will benefit your health even after you retire from the field. Travel Opportunities, Travel is one of the top perks of dance field. Travel allows you to see new places, experience new foods and cultures, and meet interesting new people. Many dance troupes get the chance to travel around the U. S. and even internationally if they are part of a company. Food and lodging are typically covered, so you won't need to cover these sorts of expenses. Working for Yourself; Being a dancer is largely a freelance job, since many dancers work for several companies on a part-time basis. This means that you work when you want to work, and you can take a break when you need to, provided you have the resources to do so. If you prefer to receive a steady paycheck, opening up your own dance studio may be the right path. You can choose the dance style you want to teach, be it ballet, tap, jazz, modern, or even ballroom or hip-hop. You will also be able to select the hours of operation and the method for enrolling students. Opening your own studio will also give you the chance to choreograph your own dance routines and pass the art form down to others to enjoy. In spite of these advantages there are also many challenges to working in the dance industry. Median hourly wages of dancers were $12. 22 in May 2008. The middle 50 percent earned between $8. 03 and $18. 82. The lowest 10 percent earned less than $7. 28, and the highest 10 percent earned more than $27. 26. Annual wage data for dancers were not available, because the wide variation in the number of hours worked by dancers and the short-term nature of many jobs—which may last for 1 day or 1 week—make it rare for dancers to have guaranteed employment that exceeds a few months. Median annual wages of salaried choreographers were $38,520 in May 2008. The middle 50 percent earned between $25,320 and $55,360. The lowest 10 percent earned less than $17,880, and the highest 10 percent earned more than $67,160. Median annual wages were $37,570 in â€Å"other schools and instruction,† the North American Industry Classification System category that includes dance studios and schools. Dancers who were on tour usually received an additional allowance for room and board, as well as extra compensation for overtime. Earnings from dancing are usually low because employment is irregular. Dancers often supplement their income by working as guest artists with other dance companies, teaching dance, or taking jobs unrelated to the field. Earnings of dancers at some of the largest companies and in commercial settings are governed by union contracts. Some dancers in major opera ballet, classical ballet, and modern dance corps belong to the American Guild of Musical Artists, Inc. of the AFL-CIO; those who appear on live or videotaped television programs belong to the American Federation of Television and Radio Artists; those who erform in films and on television belong to the Screen Actors Guild; and those in musical theater are members of the Actors' Equity Association. The unions and producers sign basic agreements specifying minimum salary rates, hours of work, benefits, and other conditions of employment. However, the contract each dancer signs with the producer of the show may be more favorable than the basic agreement. Most salaried dancers and choreographers covered by union contracts receive some paid sick leave and various health and pension benefits, including extended sick pay and family-leave benefits provided by their unions. Employers contribute toward these benefits. Dancers and choreographers not covered by union contracts usually do not enjoy such benefits. I selected this career because I believe that a career as a dance captain can be very challenging and I always ready for new challenges. I am also very concerned about being health and a career as a dancer will allow me to do what I love and keep my body healthy. I find this career to be very enjoyable because of the joy that dance can bring to others and myself and that is why I would like to be a dancer. Dance captain

Sunday, November 10, 2019

E Fraud Essay

An e- fraud is considered to be an electronic crime that affects not only individuals businesses and governments but also allows for very negatively intelligent people and hackers to use their intelligence to log into other’s accounts use their credit card numbers and banking password and transact huge amounts of trade and money . it has been seen that e fraud is on the increase and this is because of the low levels of awareness, the inappropriate counter measures that are ineffective to handle this kind of fraud has led to e frauds being on the increase . The only area that has been actively involved in reducing the impact of fraud is the technical side leaving the other so many variables out of the purview of the e fraud scenario. This has made e fraud even more easier because there have been no mechanisms to reduce these occurrences and even if there are there has been limited penalties issued to the frauds that happen on the cyber space. Introduction: The complexity of modern enterprises, their reliance on technology, and the heightened Interconnectivity among organizations that is both a result and a driver of e-business these are rapidly evolving developments that create widespread opportunities for theft, fraud, and other forms of exploitation by offenders both outside and inside an organization â€Å" (KPMG 2000) The paper tries to assimilate and analyze the strategies that can be adopted by everyone who deals on the cyber space to protect their information and finances securely. This paper also tries to analyze why such frauds occurs and what can be done by stakeholders to minimize the occurrences and is it worthwhile an attempt to bring in a global governance ordinance which could help businesses and agencies nab the criminals . It is recorded that global e commerce sales are steadily growing and with this the e commerce fraud too. The eco system which has promoted the concept of ecommerce streams from the millions of shoppers and customers who use their debit and credit cards . Though online shopping is projected to be a very safe way of shopping and bank transactions through secured payment modes, frauds have been continually on the increase . It has been objectively researched that e commerce transactions have to be highly secured . Every transaction has to be screened for the following inputs . 1. Risk based authentication should be enabled for every transaction and to prove the integrity of the user. 2. Card holders‘s data has to be tokenized so that consumers identity can be authorized and protected. . Reputed brands should shut down phishing and Trojan attacks that make easy e commerce frauds. Some practical applications for reducing e commerce brands: Fraud detection and prevention by addressing the critical needs of the entire credit card eco system. Evaluating transactions for the risk and balancing risk activities in cards . High transaction abandonment rates that results from poor user experience . Reducing the compliance costs so that we e commerce frauds commitment costs become high . The following diagrammatic representation shows how the personal data ecosystem is subject to hacking by very professional hackers. (source:Google. com) Credit card fraud The credit card industry reports huge frauds conducted over the internet in the US alone, in the year 2010, $8. 6 billion card frauds occurred (Aite Group study). With worldwide electronic information sourcing and data storage and the thousands on online purchasing that is going on, the frequency of card usage has increased and this has resulted in financial institutions and cardholders becoming victims of e fraud . Countries worldwide have set up agencies to monitor e fraud and have their own agencies to take care of such crimes especially those related to the cyber space and those which happen on cyberspace and in ecommerce space . E commerce sales is expected to total almost $1 trillion by 2013. Ecommerce fraud is also growing along with this. Fraudulent transactions rose from 2. 7 billion in 2010 to $3. 4 billion in 2011 and are expected to grow exponentially. The use of internet has made these frauds possible. There are many reasons why these frauds occur. . The increasing complex software that is now being used to relay ecommerce has made the systems vulnerable to attacks . 2. There are thousands of malicious codes and other tools that help hackers and attackers . 3. The increasing use of high speed internet at homes with very little security makes attack much easy . 4. The rate at which technology is changing and the ease of adaptation to the new technology and the users rather slow pace in adopting to good computer security practices is another compelling reason for fraud . . the hidden costs that are involved in an ecommerce portal goes unnoticed because the security systems that have to take care of this and when systems are set up, there is always the likelihood that ambitious technology experts give least preference to securing the information site and privacy conditions People and business which conduct business online do not inform people of the expected frauds that could occur due to ecommerce transactions, because of this frauds happen . The lack of proper governance and regulation regarding type of penalties and punishments that would be given to fraud committers is rather slack . There are no world wide global laws to tackle such frauds and hence frauds that are committed online find no jurisdictional limits and so governments do not know how to pin point the responsibility . This loop hole has been used by fraudsters . The online world is full of pseudonyms and pseudo identities . Hence tracking such frauds also becomes very difficult. There are no experts who could be given the responsibility of tracking and strategizing how such frauds occur . Though technology now is slowly trying to understand the macro environment of the fraud related scenarios, the risk and costs associated with bringing in security is very high and hence the adaptability of such scenarios cannot be done by all firms who have e commerce portals . Stakeholders involvement in the vulnerability that exists across the value chain is seen as the most critical issue in a fraud . Crime congress global: This is an imitative taken by the agency to help stakeholders and victims of e commerce fraud to find effective solutions. This proves information security in all countries of the world to meet the challenges arising from e commerce. This agency prominently uses technology and provides technology solutions in partnership with the business community to prevent frauds through information security technology and information risk management, forensics, investigations, audit, risk, compliance and fraud. This agency has been conducting global awareness programs for reaching out to institutes, businesses and government to partner in helping reduce ccurrences of e fraud to strategic and technological challenges. This is a strategic initiative involving al stakeholders to proactively reduce the risks of ecommerce frauds and to defend IT systems from those threats which are emerging and to comply with relevant legal and regulatory laws . this initiative is a step towards combating the threat of the increasing cases of fraud. This partnership brings out very important initiatives to protect not only customers but a lso business houses from succumbing to the increasing menace of hackers. Technology solutions and other security solutions are placed in a consultative approach towards tackling this . If an international business committed copyright infringements then legal action under Criminal Jurisprudence legal action can be resorted to under Article 61 Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) where the loser has got legal recourse to his stolen property by means of criminal sanctions and which will thereby allow for legal and criminal punishment of the infringement and the infringer . t has been felt that all types of infringement should be punished with criminal sanctions. People can appeal under this act for legal action or they can hotlist an organization under cyber space if there are cases of patent stealing and web site hacking. The Copyright, Designs and Patents Act 1988 also known as the CDPA can be used in cases where infringement has taken place. If an international business committed copyright infringements or steals a pa tent then as a victims we can take recourse under the above mentioned acts which give protection to IRP which are stolen and pirated and copied.. Early referral is said to be the best away to ensure that the evidence is properly secured and that all the investigative revenues are fully explored with the possible undercover law enforcement activities. Perhaps, communication with the law enforcement activities allows the victim to coordinate civil proceedings with the possible criminal enforcement. Though legally recourse is available it is easy to settle out of court because protection of copyright is a prelude to production of the material or product. People who invent need to protect their patents. Once the patent is protected then it cannot be copied or pirated as punishments are very severe in such cases. With so many innovations taking place in the US especially with cyber technology there has been very serious issue of pirating software and the Beijing convention has called for all member countries to come out with anti pirating laws which could effectively punish those who are caught. USA will have to worry about the number of infringements that are taking place. It has admitted legal course in serious cases but USA is neither able to gun down the culprit nor is it able to find means of putting an end to it because of the geographical distance which makes it impossible to monitor the use of technology. USA is very careful in dealing with countries where incidences of Infringement are very high and tries to bring in severe legal clauses to protect their interests. Computer forensics investigator and other laws A computer forensics investigator works with a pre determined notion of computer crimes. But that is not a sufficient coverage that should be catered. A computer forensics investigator looks upon other law system too such as data protection, data integrity, data control, audit of data components, investigation around the computer and etc. A forensics investigator moves with an initial priority of computer crime. But he should be well governed with other laws. This helps him to establish himself more concretely on the crime scene. He is prepared with the notion of covering up the areas totally in order to fully satisfy himself on the grounds that nothing is left behind. He checks into the data system, recovers the data, checks the integrity of the data, protects the data, looks for evidences around the computer, checks the network system of the accused person, goes more deeply with the computing system to enable him searching beyond the computers to narrow down his investigation procedure. Some other laws such as, human rights, digital rights, information system laws, computer laws are of special interest to him. This gives him the power to deal with any case that involves ethical computer crime. He is much more developed investigator if he is well adverse with the above law system. E – Discovery E Discovery or Electronic Discovery refers to discovery in civil litigation. This discovery process deals with the exchange of information in the electronic format. Electronic Discovery is pretty useful for the forensics analysis. We know that Forensics analysis deals with the investigation of crime scene involving computer and cyber crimes and evidence is the prime source of investigation that leads to a successful procedure. Hence the investigator is pretty much confident about the E Discovery System. The investigator with the help of E Discovery processes such as Electronic messages, voicemail; smart phones etc recover every bit of information that is required in the gathering of evidence required for the forensics investigation. The whole process of collection data through E discovery and jotting it down to the report makes it much easier for the investigator. The E discovery has led to new developments and changes in the investigation system of the cyber crimes. With latest e discovery modes as mentioned above, an investigator is much more confident about its movement into the IT system of the accused criminal, and supporting the cause with rather strong and reliable evidences gathered. E discovery is a radical change in the process of investigation and has led to much more focused and integrated system of computer investigation. Conclusion The whole conclusion is based on the cyber crimes and the enacting system of law prevailing. The cyber crimes have increased in geometric progression over the years which have led to many disasters and crimes. With the increased number of crimes taking place day in day out, the laws have been made much stricter in order to ensure that the numbers of crime taking place gets minimized and there is a fear of messing up the computer system. The laws have addressed the message of intent of distorting computer systems which will constitute a crime. Many forensics investigators have been seen in the picture off late which governs the system of computer crime. These investigators are well adverse with the system laws and crime scenes. They effectively handle the situation and get to the desired results enabling quick and accurate reply to crime involved. Thus the laws have been successful over the years in minimizing computer threats and crimes. Ecommerce has revolutionized trade in many ways and consumers have also been cheated in ways that were unknown in traditional sales. In order to protect the consumers, traders on the internet and operators in the cyber space have got together to form associations and laws that would protect the consumers in the text of ecommerce. Though every country has passed consumer protection acts which are rules and regulations to protect the consumers from fraudulent trade practices in the market. There laws were enacted to protect the consumers and give them rights to ensure that they obtain truthful information and right products as so designed by the seller. The laws have been designed to protect consumers from businesses indulging in unlawful and unfair practices . The governments of all countries have passed regulations to protect the rights of consumers especially in those products where health and safety are chief ingredients. Consumer protection is also in the form of consumer rights which consumers can exercise through redressal grievance and consumer courts. This is the history behind the concept of consumer protection. In direct contrast to the traditional business where the buyer and seller are in direct contact with each other and the buyer can inspect the goods before buying, in ecommerce the communication is only through an electronic form and business is conducted in a paperless environment. More importantly the internet or e transactions play a very important role in helping buyers and in assisting in choice comparisons and locating a product on the internet. (http://www. apec. rg/apec/apec_groups/som_special_task_groups/electroniccommerce. html. Accessed on 13/2/04) Consumer concerns in e commerce starts form the point of instance as the buyer is not known to the seller and vice versa and hence the privacy and confidentiality aspect of a trade which has to be concluded needs authenticity. Consumers are worried about 1. The unfair marketing practices that sellers resort to on the web. 2. The terms of sale, refunds, cancellation of orders, warranty conditions 3. Enforceability of the contract, performance and non performance. . Delivery time, late deliveries and no delivery verification. 5. The most illegal use of information available on credit cards payment made for online purchases. 6. Fraud and cheating because transactions are not authenticated by any physical source. 7. unsafe products not confirming to safety standards. 8. Misuse of personal information for other purposes. Since majority of e commerce transactions lead to the buyer being put to a disadvantage the Issues relating to consumer disputed have to be minimized and arbitrated. t is all the more difficult because the sellers are beyond national jurisdiction as it happens on cyberspace and SO the risks that arise out of such trade has to be taken care of and the consumers have to be suitably protected. a landmark development n the form of the E -Commerce group otherwise known as The Electronic Commerce and Consumer Protection Group is constitute d by leading companies on the net like America Online, AT&T, Dell, IBM, Microsoft, Network Solutions and Time Warner. These companies predominately deal in online sales of their products and so recognize the growing need of consumer protection and have addressed issues regarding consumer protection as best practices of industry and have created an environment which would allow consumers to resolve disputes arising on cyber space. The American Bar Association Task Force on E-commerce and Alternative Dispute Resolution is one of the best reference guide to consumer protection on the cyber space. This organization was asked to suggest workable guidelines that parties dealing in online transactions can use for ODR’s (online dispute redressal) . the complexity further arose from the fact that there was multijurisdictional disputes arising from B2B and B2c businesses. (THIS IS THE LAW ENFORCEMENT AND IS REFREED TO IN EXACT TEXT) To quote the words of the task force of the Ecommerce group â€Å"that there are many ways to help prevent as well as to help resolve disputes or complaints that arise from e-commerce transactions, the Task Force makes the following recommendations and observations: 1. E-commerce businesses should place an enhanced emphasis on all stages of dispute prevention, complaints handling, and effective methods of redress through ADR and ODR. 2. Internet merchants, governmental and nonprofit entities should place a greater emphasis on consumer education and the prevention of e-commerce disputes. 3. Protecting consumers requires adequate standards and codes of conduct for ecommerce businesses. 4. Internet merchants should be encouraged to participate in and subscribe to relevant e-commerce codes of conduct and trust mark programs. 5. Internet merchants should develop or continue to improve on their in-house complaints handling mechanisms, and educate consumers as to how to use these in-house procedures effectively. 6. For consumers, recourse to in-house complaints mechanisms is normally the first and best means to obtain redress from reputable merchants. Accordingly, consumers should be encouraged to utilize the in-house complaints handling mechanisms offered by reputable Internet merchants before resorting to third party dispute resolution mechanisms. 7. at present, the lack of ODR does not appear to be a material impediment to the growth of B2C e-commerce. . At present, ODR is subsidiary to other higher priority consumer protection activities, including consumer education and use of measures that help prevent or decrease the incidence of fraud in Internet transactions. 9. Recognizing that enforcement of outcomes and decisions reached through ODR may be difficult, consumers should be encouraged to consider using other dispute prevention mechanisms such as escrow services and credit card charge back mechanisms when transacting online. 10. Rather than create a code of conduct for ODR Service Providers, the Task Force has drafted Recommended Best Practices by ODR Service Providers. 1. The Task Force recommends the creation of a new informational entity (referred to as the ADRCenter) that would provide information about ODR in an effort to educate and familiarize consumers, businesses, lawyers and other professionals with this new type of service. 12. For the advancement of ODR as an effective and efficient means of cross-border dispute resolution for both B2B and B2C transactions, there needs to be an appropriate emphasis on the development of interoperable communication and data-sharing platforms. 3. The Task Force believes that much of the education that will be useful for consumers will also be useful for businesses – especially small to medium sized enterprises and those who are ne w to the Internet marketplace and to cross-border transactions. ( Task force quoted verbatim) among all of ecommerce frauds the greatest of consumer complaints arose from identity thefts. The Federal trade commission has released statistics stating that out of 2004,000 complaints received from consumers 42% elated to fraud and identity of the seller, followed by internet auctions which constituted 10%,followed by other non performances like non delivery of goods, inferior quality goods, trial offers from the net, shop at home offers and so on. This only reiterates that consumers have to be protected and laws of cyber space have to be strictly regulated to afford consumer protection. Consumer protection measures were seen very importantly in the light of an interactive poll which shows the increased awareness of consumers against online frauds . They were dissuaded by online shopping and cited some of the reasons why they had not shopped recently. 57% said that they were worried about their credit card number being stolen,57% were worried about confidentiality measures being violated,38% doubted the integrity on the seleers,26% wanted some personal attention to be given while they shopped,37% doubted the reliability of the sellers,47% said that wanted to physically inspect the product and 25% cited many unknown reasons. source: Harris interactive)It was increasingly felt that consumer education will be able to help protect consumers better. It also shows increased concerns about consumers not knowing how to transact online. It is suggested that traders using the electronic media need to given all information that is required for consumers to feel safe about shopping online . Quoting Internet merchants association ,† Merchants need to have greater and enhanced disclosure on their websites as well as heightened compliance with relevant consumer protection law. † Another pertinent consumer protection data and study conducted by a New Zealand organization on 700 web sites explicitly brought out the consumers heightened awareness of ecommerce frauds and consumers came out with their reasons of the need for protecting their rights against fraudulent organizations. They said that 50% of the vendors had not installed security measures on the payment options, 62% did not speak of refund policies, 78% said that the vendors did not advice customers of how to lodge complaints,90% said that they did not know about laws pertaining to consumer redresses and 25% said that the vendors did not show physical address. Despite all this majority of consumers preferred to shop online so laws pertaining to consumer protection need to be implemented in its fullest sense. Consumers International released its Privacy@ net study in which it concluded: that though almost all the traders online collected data regarding the personal information of the buyers very few of them institutionalized a privacy policy regarding the use of the information that the buyer gave. Though these were correct measures to provide security, majority of these proved meaningless to the buyers. it was very common in the US and Europe to find traders giving scant respect to global standards on data privacy. Even the basic principles of informing the customers of how the data will be used, how the firm will access the data , how the consumer can use the data and how the security of the data is sought and maintained is not disclosed. A comparative study of the sites of USA and UK are no different with regard to privacy policy as both played on the information made available to them. The US online trading sites set decent privacy policies which looked good enough to follow. In The European trading sites the consumers had the law backing them up and the presence of an ombudsman and a government representative in the form of a data protection officer took care of the consumer rights and protection if breached. He also intervened to speak on behalf of the consumers if the law was tampered with . in fact it is sad to know that both the countries have left little choice to consumers in terms of data protection.. † This was a comparative study of the European merchants and the USA merchants. But both of them accepted the fact that consumer protection was a must if their sales and revenues had to increase. As a step towards greater protection measures to consumers the task force on ecommerce and protection said that various disputes redressal mechanisms have to be introduced in the form of dispute prevention like education of consumers, feedback collection from consumers, ombudsman appointments, negotiations, mediation, arbitrators, and assessment of valid consumer grievances.

Thursday, November 7, 2019

Discover the Worlds Smallest Tree

Discover the World's Smallest Tree Some people claim that the title Worlds Smallest Tree should go to a tiny plant that grows in the coldest regions of the Northern Hemisphere. Salix herbacea, or dwarf willow, is described by some Internet sources as the very smallest tree in the world. Others see the tree as a woody shrub that does not meet the definition of a tree accepted by botanists and foresters. Definition of a Tree The definition of a tree that most tree scholars recognize is a woody plant with a single erect perennial trunk that reaches at least 3 inches in diameter at breast height (DBH)Â  when mature. That certainly does not fit the dwarf willow, although the plant is a willow family member. Dwarf Willow Dwarf Willow or Salix herbacea is one of the smallest woody plants in the world. It typically grows to only 1-6 cm in height and has round, shiny green leaves 1-2 cm long and broad. Like all members of genus Salix, dwarf willow has both male and female catkins but on separate plants. The female catkins are red in color, while the male catkins are yellow.

Tuesday, November 5, 2019

Verbless Sentences

Verbless Sentences Verbless Sentences Verbless Sentences By Ali Hale One of the basic grammatical rules in English is that every sentence should contain a verb. Some of Daily Writing Tips’s readers may have had sentences underlined in red at school if they weren’t a â€Å"proper sentence† – and I’m sure many of you (especially fiction writers) have had Microsoft Word squiggle a green line under a sentence saying â€Å"Fragment (consider revising).† But there are times when you may want to use verbless sentences for effect, and I would argue that in all except very formal types of writing (such as reports at work and student essays), this is entirely appropriate. Verbless sentences in fiction Fiction writers, in particular, should not be afraid of experimenting with verbless sentences – many famous authors use them to great effect. Grammatical rules tend to be relaxed in fiction (especially, though not exclusively, in dialogue) so if your style lends itself towards writing choppy or stark verbless sentences, give it a try. These are the opening sentences to several paragraphs in Chapter Two of Margaret Atwood, The Handmaid’s Tale.) A chair, a table, a lamp. †¦ A window, two white curtains †¦ A bed. †¦ Verbless sentences in blogging Another medium where verbless sentences are often entirely appropriate is in blogging. Most blogs are informal and conversational, written like a friendly letter to the reader. Just as novelists do, bloggers can use verbless sentences for effect – often grabbing the readers’ attention. The online form also means that short, snappy sentences are most likely to engage a reader – and leaving out verbs can accomplish this. Here’s an example from the Men with Pens (the last sentence is verbless): He thought I was joking. â€Å"Dude. They’re seriously not sold in pairs. Who just uses one?† â€Å"Jeez. They obviously employ geniuses in their marketing department.† Or crooks. Verbless sentences in opinion articles Even if you’re writing for a traditional publication – perhaps a newspaper or a magazine – you might be able to get away with using the occasional verbless sentence. Opinion pieces, in particular, tend to be popular due to the writer’s unique style – and this may involve a blog-like chatty tone. Here’s an example from Robert Crampton, who writes the popular Beta Male column in the UK national newspaper The Times. The cash haemorrhage continues. A raffle. Another raffle. A fiver on the final score. A fiver on the first scorer. A fiver on the last scorer. If you take care to make sure each of your sentences is a â€Å"proper† one, then give yourself permission to experiment today. In the next piece of fiction you write, or the next article for a blog or magazine, try using a few verbless sentences. If you’re not sure how to do this, here’s a few examples: She asked, â€Å"Have you done the laundry yet?† Fat chance, I thought. She asked, â€Å"Have you done the laundry yet?† Fat chance. I went through the mental check list again: lunch boxes, water bottles, swimming towels, keys, change†¦ Lunch boxes. Water bottles. Swimming towels. Keys. Change†¦ Danny rides his bike up to the shore, and stares out at the waves. They’re crashing close. The tide’s coming in. Danny rides his bike up to the shore, and stares out at the waves. Crashing. Close. The tide’s coming in. Let us know how you get on! And if you’re a stickler for putting a verb in every sentence, and think this rule shouldn’t be broken, please do add your thoughts in the comments. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Grammar category, check our popular posts, or choose a related post below:5 Uses of Infinitives"Have" vs "Having" in Certain ExpressionsThrew and Through

Sunday, November 3, 2019

Crisis communications- Honda Recall Research Paper

Crisis communications- Honda Recall - Research Paper Example It is vital to note that business apologizes differ from personal apologies because business apologizes are given in order to retain clients, customers and business relationships (Meiners, Ringleb & Edwards, 2008). A business apology is given to customers regardless of whether the error or mistake was preventable or not. In this case, the business apology will be given in writing through social media platforms such as Facebook and Twitter, and verbally, through YouTube and television advertisements. Honda should follow strategic steps in providing its apologies to its customers. The first step is monitoring the presence of Honda’s products in the market and social media platforms. The second step is the engagement of customers and product reviewers immediately. In the apology, Honda should be honest and assume responsibility for its shortcomings. Most importantly, Honda should learn from its mistakes (Meiners, Ringleb & Edwards, 2008). The first thing that Honda should do before offering its apologies is to study or monitor its presence in the market and social platforms. In order to respond to the issue appropriately, Honda should be aware of the reviews provided by its clients and industry analysts. Once the firm has studied its presence and customer perceptions, it should apologize appropriately, based on the issues raised by the customers. This takes the firm to the next step, which is engagement with customers. Engaging with customers will enable Honda to obtain con structive feedback. Social media provides ideal platforms for offering apologizes. Social media such as Facebook, Twitter and YouTube have combined audiences of approximately 1 billion people on a daily basis (Meiners, Ringleb & Edwards, 2008). The apology message should focus on customer satisfaction and the firm’s shortcoming. Honda should know the right time to offer its apology. The